Evolution of Phishing Attacks

The Evolution of Phishing Attacks: Beyond Email and How to Protect Your Organization

The Evolution of Phishing Attacks: Beyond Email Phishing attacks have long been synonymous with email, but the landscape of cyberthreats has evolved dramatically. Today, phishing is not confined to email inboxes; it ...
Multi-Channel Threat Blindspot Leaves Your Organization Vulnerable to Breach

Multi-Channel Threat Blindspot Will Leave Your Organization Vulnerable to Breach

In today’s hyper-connected world, modern workers rely on a multitude of communication and collaboration tools to get work done efficiently. Email, SMS, Slack, Microsoft Teams – the average employee juggles between 6-10 ...
STORM-0539 Smishing compromises employees accounts

Sophisticated Smishing Compromises Employee Accounts, Accesses Corporate Gift Card Systems

We at SlashNext want to draw attention to the alarming trend of cybercriminals exploiting advanced techniques to target retail corporations, as highlighted in the recent FBI Private Industry Notification (PIN). The threat ...

Crypto Phishing Kit Impersonating Login Pages: Stay Informed

In the ever-evolving landscape of cybersecurity, a fresh menace has emerged, targeting crypto enthusiasts through a sophisticated phishing kit. This crypto phishing kit, part of an elaborate attack scheme dubbed CryptoChameleon, is ...
Android Rafel RAT ransomware

Phishing Threats Rise as Malicious Actors Target Messaging Platforms

As messaging apps like Telegram gain popularity, cybercriminals are increasingly finding they are an attractive vector for phishing attacks ...
Security Boulevard

MoqHao Evolution Poses Immense Threat to Android Users

Cybersecurity threat experts have recently discovered a new variant of the malware named XLoader, commonly known as MoqHao, that has the ability to automatically infect devices without any user interaction. Being termed ...
BlackCloak: What You Need to Know About Smishing

Text Message Spam & Smishing: Navigating the Changing Landscape of Cyber Threats

In our rapidly evolving digital era, cyber threats are as constant as change itself. It’s a dynamic landscape that requires us to stay aware and vigilant, and adapt our defenses to counter ...
Today’s cybersecurity health checks must identify AI-based threat risks. Does yours?

Today’s cybersecurity health checks must identify AI based threats. Does yours?

Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you can’t rely on outdated risk assessment methodologies that struggle to keep pace ...
CISOs Increasingly Concerned About Mobile Threats

CISOs Increasingly Concerned About Mobile Threats

A new warning from Verizon about the rise of smishing, spam text messages and text scams and the FBI reporting $10.3 billion in internet fraud last year, CISOs are increasingly concerned about ...
SMS Phishers Harvested Phone Numbers, Shipment Data from UPS Tracking Tool

SMS Phishers Harvested Phone Numbers, Shipment Data from UPS Tracking Tool

The United Parcel Service (UPS) says fraudsters have been harvesting phone numbers and other information from its online shipment tracking tool in Canada to send highly targeted SMS phishing (a.k.a. "smishing") messages ...

Application Security Check Up